(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Method to provide an enhancement to an email server's functionality by utilizing "sticky" bbc email addresses on all subsequent responses to a given email message in a clandestine way.

Publishing Venue

Abstract

Disclosed is a method for allowing bbc-ed recipients of an email to receive all subsequent responses to the original email privately.

Country

Undisclosed

Language

English (United States)

This text was extracted from a PDF file.

This is the abbreviated version, containing approximately
52% of the total text.

Page 1 of 2

Method to provide an enhancement to an email server 's functionality by utilizing "sticky" bbc email addresses on all subsequent responses to a given email message in a clandestine way.

Currently, sending an email message with the bcc filed populated does not result in bcc recipients receiving all consequent responses to the original email. The method described here offers a convenience when the entire chain of email responses needs to be automatically and confidentially forwarded to selected email recipients, without other recipients receiving the responses. This feature would not apply to responses to an email message which was forwarded by any of the original recipients.

Method 1:

Require the email server to attach to each email, a base64 encoded block of encrypted text containing the list of "sticky" bcc recipients.

The bcc field would be encrypted and decrypted using server's certificate.

Because of the encryption block being of constant size,there would have to be a limit to the total number of characters taken up by all email addresses in the bcc field. The email server system should guarantee a known maximum number of bcc email addresses that may be provided.

Method 2:

Implement the bcc-tracking logic on the SMTP server.

Method 2 would not impose any limits on he number of bcc-ed email addresses. Carrying the sbcc addresses in actual email messages as described in method 1 could be still useful if various

participating vendors' servers understand how to interpret such contents. This could be an option

in case direct server to server querying of the sticky bcc addresses is not possible. It could also make the feature more easily adoptable by different email server vendors.

The method requires the email system to be able to define and execute the following logic:

Implement the bcc tracking logic on the server or within a special block (attachment) of the